Modèle:GreHack2013-conf accepted talks pics content : Différence entre versions

De Ensiwiki
Aller à : navigation, rechercher
(Accepted Papers & Talks)
(Accepted Papers & Talks)
Ligne 8 : Ligne 8 :
 
----
 
----
 
|-
 
|-
| Markku-Juhani Olavi Saarinen
+
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Markku-Juhani_Olavi_Saarinen]]
 
| [[GreHack-2013-Speakers_Talks#Markku-Juhani_Olavi_Saarinen|Markku-Juhani Olavi Saarinen]]
 
| [[GreHack-2013-Speakers_Talks#Markku-Juhani_Olavi_Saarinen|Markku-Juhani Olavi Saarinen]]
 
| [http://www.ntu.edu.sg/Pages/index.aspx NTU, Singapore]
 
| [http://www.ntu.edu.sg/Pages/index.aspx NTU, Singapore]
Ligne 16 : Ligne 16 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2032-speakers-mathieu_cunche.png|90px|link=GreHack-2013-Speakers_Talks#Mathieu_Cunche]]
 
| [[GreHack-2013-Speakers_Talks#Mathieu_Cunche|Mathieu Cunche]]
 
| [[GreHack-2013-Speakers_Talks#Mathieu_Cunche|Mathieu Cunche]]
 
| [http://www.inria.fr INRIA]
 
| [http://www.inria.fr INRIA]
Ligne 24 : Ligne 24 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2032-speakers-ludovic_apvrille.png|90px|link=GreHack-2013-Speakers_Talks#Ludovic_Apvrille]]
 
| [[GreHack-2013-Speakers_Talks#Ludovic_Apvrille|Ludovic Apvrille]]
 
| [[GreHack-2013-Speakers_Talks#Ludovic_Apvrille|Ludovic Apvrille]]
 
| rowspan="2" | [http://www.fortinet.com/ FORTINET]
 
| rowspan="2" | [http://www.fortinet.com/ FORTINET]
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Pre-filtering_Mobile_Malware_with_Heuristic_Techniques|'''Pre-filtering Mobile Malware with Heuristic Techniques''' (summary)]]
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Pre-filtering_Mobile_Malware_with_Heuristic_Techniques|'''Pre-filtering Mobile Malware with Heuristic Techniques''' (summary)]]
 
|-
 
|-
|
+
| [[Image:Grehack-2032-speakers-axelle_apvrille.png|90px|link=GreHack-2013-Speakers_Talks#Axelle_Apvrille]]
 
| [[GreHack-2013-Speakers_Talks#Axelle_Apvrille|Axelle Apvrille]]
 
| [[GreHack-2013-Speakers_Talks#Axelle_Apvrille|Axelle Apvrille]]
 
|-  
 
|-  
Ligne 35 : Ligne 35 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Josselin_Feist]]
 
| [[GreHack-2013-Speakers_Talks#Josselin_Feist|Josselin Feist]]
 
| [[GreHack-2013-Speakers_Talks#Josselin_Feist|Josselin Feist]]
 
| [http://www-verimag.imag.fr VERIMAG]
 
| [http://www-verimag.imag.fr VERIMAG]
Ligne 43 : Ligne 43 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2013-speakers-alejandro_nolla.png|90px|link=GreHack-2013-Speakers_Talks#Alejandro_Nolla]]
 
| [[GreHack-2013-Speakers_Talks#Alejandro_Nolla|Alejandro Nolla]]
 
| [[GreHack-2013-Speakers_Talks#Alejandro_Nolla|Alejandro Nolla]]
 
|
 
|
Ligne 51 : Ligne 51 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2013-speakers-eireann_leverett.png|90px|link=GreHack-2013-Speakers_Talks#Eireann_Leverett]]
 
| [[GreHack-2013-Speakers_Talks#Eireann_Leverett|Eireann Leverett]]   
 
| [[GreHack-2013-Speakers_Talks#Eireann_Leverett|Eireann Leverett]]   
 
| rowspan="2" | [http://www.ioactive.com IOActive, US]
 
| rowspan="2" | [http://www.ioactive.com IOActive, US]
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Vulnerability_Inheritance_in_Programmable_Logic_Controllers|'''Vulnerability Inheritance in Programmable Logic Controllers''' (summary)]]
 
| rowspan="2" | [[GreHack-2013-Speakers_Talks#Vulnerability_Inheritance_in_Programmable_Logic_Controllers|'''Vulnerability Inheritance in Programmable Logic Controllers''' (summary)]]
 
|-
 
|-
|
+
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Reid_Wightman]]
 
| [[GreHack-2013-Speakers_Talks#Reid_Wightman|Reid Wightman]]
 
| [[GreHack-2013-Speakers_Talks#Reid_Wightman|Reid Wightman]]
 
|-  
 
|-  
Ligne 70 : Ligne 70 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#Ruo_Ando]]
 
| [[GreHack-2013-Speakers_Talks#Ruo_Ando|Ruo Ando, Yuuki Takano and Satoshi Uda.]]
 
| [[GreHack-2013-Speakers_Talks#Ruo_Ando|Ruo Ando, Yuuki Takano and Satoshi Uda.]]
 
| [http://www.nict.go.jp/en/ NICT, Japan]
 
| [http://www.nict.go.jp/en/ NICT, Japan]
Ligne 78 : Ligne 78 :
 
----
 
----
 
|-
 
|-
|
+
| [[Image:Grehack-2012-speakers-missing_picture.png|90px|link=GreHack-2013-Speakers_Talks#François_Desplanques]]
| [[GreHack-2013-Speakers_Talks#François_Desplanques |François Desplanques]]
+
| [[GreHack-2013-Speakers_Talks#François_Desplanques|François Desplanques]]
 
| [http://ensimag.grenoble-inp.fr  Ensimag]
 
| [http://ensimag.grenoble-inp.fr  Ensimag]
 
| [[GreHack-2013-Speakers_Talks#Attacks_using_malicious_devices:_a way_to_protect_yourself_against_physical _access|'''Attacks using malicious devices: a way to protect yourself against physical access''' (summary)]]
 
| [[GreHack-2013-Speakers_Talks#Attacks_using_malicious_devices:_a way_to_protect_yourself_against_physical _access|'''Attacks using malicious devices: a way to protect yourself against physical access''' (summary)]]
 
|-
 
|-
 
|}
 
|}

Version du 5 septembre 2013 à 18:50

Accepted Papers & Talks

Pic Author(s) Corp/Lab/Gov/Self Paper + Talk
Grehack-2012-speakers-missing picture.png Markku-Juhani Olavi Saarinen NTU, Singapore Developing a Grey Hat C2 and RAT for APT Security Training and Assessment (summary)

90px Mathieu Cunche INRIA I know your MAC Address: Targeted tracking of individual using Wi-Fi (summary)

90px Ludovic Apvrille FORTINET Pre-filtering Mobile Malware with Heuristic Techniques (summary)
90px Axelle Apvrille

Grehack-2012-speakers-missing picture.png Josselin Feist VERIMAG Statically Detecting Use After Free on Binary Code (summary)

Grehack-2013-speakers-alejandro nolla.png Alejandro Nolla Amplification DDoS attacks with game servers (summary)

Grehack-2013-speakers-eireann leverett.png Eireann Leverett IOActive, US Vulnerability Inheritance in Programmable Logic Controllers (summary)
Grehack-2012-speakers-missing picture.png Reid Wightman

Grehack-2013-speakers-jagdish achara.jpg Jagdish Achara Inria Privatics Detecting Privacy Leaks in the RATP App: how we proceeded and what we found (summary)

Grehack-2012-speakers-missing picture.png Ruo Ando, Yuuki Takano and Satoshi Uda. NICT, Japan Unraveling large scale geographical distribution of vulnerable DNS servers using asynchronous I/O mechanism (summary)

Grehack-2012-speakers-missing picture.png François Desplanques Ensimag Attacks using malicious devices: a way to protect yourself against physical access (summary)